Research Library

Powered by

Risk Management Research

  • Your Guide to Matching Applications to the Right Cloud

    Sponsored by: Verizon

    This white paper reveals three steps to select the best cloud delivery model for each of your enterprise workloads.

  • Holistic Protection against Targeted Attacks

    Sponsored by: Trend Micro

    This white paper discusses how you can design security customized for your network and for fighting off potential targeted attacks.

  • CSI Techniques for IT Security

    Sponsored by: Absolute Software

    This webinar illustrates the importance of staying ahead of the curve. Join Lance Mueller, Magnet Forensics' own Director of Forensics, to learn why you should proactively monitor for early signs of an IT security incident.

  • Powerful Anti-Malware for Your Mobile Device

    Sponsored by: Malwarebytes Corporation

    Those who haven't yet secured their mobile devices are courting serious risk. In this white paper, discover what mobile anti-malware can do to bolster your mobile security.

  • Creating a Powerful Anti-Malware Defense

    Sponsored by: Malwarebytes Corporation

    In today's high-risk cybercrime environment, anti-malware and anti-exploit software need to be implemented on top of basic anti-virus. Read this white paper to learn more about successfully doing so.

  • Protect Your Data While Increasing End-User Productivity

    Sponsored by: Absolute Software

    The District of Columbia National Guard (DCNG) once struggled to run inventories on devices and protect against data breaches. Tune in to the following webinar and learn how DCNG was able to improve inventory accountability and save resources.

  • Endpoint Security for Today's Cyber Risks

    Sponsored by: Malwarebytes Corporation

    In this white paper, discover how you can create layered endpoint security with the combination of anti-malware and anti-exploit software.

  • Data Breaches: Technical Options to Avoid Bad Press and Sales

    Sponsored by: Absolute Software

    This webinar features Stephen Treglia, formerly of the Technology Crime Unit in New York, in addition to Geoff Glave, Senior Product Manager at Absolute Software. Join them as they take an in-depth look at technical options to consider that could help you minimize - or even avoid - security breaches.

  • Case Study: Ensuring Automated Access Governance

    Sponsored by: RSA

    In order to ensure that data is accessed only by employees or partners with the proper permissions and unauthorized users are blocked, a strong IAM and governance is needed.  This case study explores how to develop a new IAM and governance strategy using a 4 phase framework and how to automate it to overcome common challenges.

  • Five Design Principles of an Effective Endpoint Security Strategy

    Sponsored by: Absolute Software

    Access this webinar and learn about zero-day malware and other alarming virtual pests that pose a threat to organizations. Uncover the five design principals, by way of Forrester Research, that indicate an effective endpoint strategy.

  • Secure Federal Data and Support Your Mobile Workforce

    Sponsored by: Absolute Software

    This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.

  • Security Reimagined

    Sponsored by: FireEye

    It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.

  • Anatomy of Cyber Attack

    Sponsored by: Hewlett-Packard Company

    Attend this webinar to learn the anatomy of an advanced persistent threat and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.

  • Think Like a Bad Guy: Understanding Advanced Threats and How to Mitigate Them

    Sponsored by: Hewlett-Packard Company

    Increasingly, today's advanced threats circumvent traditional defenses—even sandboxing. This SlashGuide white paper helps you understand advanced threats and how to defend against them.

  • Survey Shows Plenty of Room for Improvement in IT Security

    Sponsored by: Hewlett-Packard Company

    A new survey from IDG Research Services reveals that most organizations lack confidence in their security defenses. Read this report to learn why, and how you can build security that's worth having confidence in.

  • Gartner Report: Instituting Layered Security Defenses

    Sponsored by: Hewlett-Packard Company

    Read this white paper and included Gartner research to learn the four phases of effective security and how you can build strong protections on each phase.

  • 4 Anti-Malware Platforms Put Through an Anti-Exploit Test

    Sponsored by: Malwarebytes Corporation

    In this video, a series of anti-malware platforms are tested with an exploit simulator test to determine which product has the early detection capabilities required for effective security.

  • Information Governance in Federal Agencies

    Sponsored by: Hewlett-Packard Company

    In this white paper, discover a 4 step plan for designing, managing, and retaining an information governance program to firm up security and gain granular control over data.

  • Infographic: What is Malvertising?

    Sponsored by: Malwarebytes Corporation

    In this infographic, learn all you need to know about malvertising and how to stop it.

  • An Inside View of a Zero-Day Campaign

    Sponsored by: Malwarebytes Corporation

    This white paper follows one real-life zero-day attack, detailing how the attack entered the network, what parts of the network it infiltrated, and how it was eventually mitigated.

  • How Anti-Exploit Software Stops Malware Early

    Sponsored by: Malwarebytes Corporation

    This brief white paper explains the concept of anti-exploit technology and discusses its capabilities.

  • An Inside View of a Zero-Day Campaign

    Sponsored by: Malwarebytes Corporation

    This article gets you inside the workings of a zero-day attack by giving you a step-by-step look at one that occurred just a few months ago.

  • Controlling Keys - How to Prevent Data Leaks

    Sponsored by: IntraLinks, Inc

    This white paper explores an alternative keys strategy that only the consumer can directly acess over a protected communications channel. View now to learn how to control access to encrypting and decrypting cloud stored files and how you can prevent data leaks.

  • Cybersecurity Trends of 2015: A View from the Front Lines

    Sponsored by: FireEye

    In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.

  • Enabling The Secure And Rapid Adoption Of Cloud Services

    Sponsored by: Microsoft

    Access the results of this Forrester report to discover what's driving the current trend towards adoption of cloud technology and why the benefits of cloud outweigh the potential security risks for many organizations. Read on to discover what your organization can do you address potential security risks in your cloud system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.